A predictive-hashing based Denial-of-Service (DoS)
resistant multicast authentication protocol was proposed
based upon predictive-hashing, one-way key chain, erasure
codes, and distillation codes techniques [4, 5]. It was
claimed that this new scheme should be more resistant to
various types of DoS attacks, and its worst-case resource
requirements were derived in terms of coarse-level system
parameters including CPU times for signature verification
and erasure/distillation decoding operations, attack levels,
etc. To show the effectiveness of our approach and to
analyze exact resource requirements in various attack
scenarios with different parameter settings, we designed
and implemented an attack simulator which is platformindependent.
Various attack scenarios may be created with
different attack types and parameters against a receiver
equipped with the predictive-hashing based protocol. The
design of the simulator is explained, and the simulation
results are presented with detailed resource usage
statistics. In addition, resistance level to various types of
DoS attacks is formulated with a newly defined resistance
metric. By comparing these results to those from another
approach, PRABS [8], we show that the resistance level of
our protocol is greatly enhanced even in the presence of
many attack streams.